Description
Multiple SQL injection vulnerabilities in default.asp in Enthrallweb eReservations allow remote attackers to execute arbitrary SQL commands via the (1) Login parameter (aka username field) or the (2) Password parameter (aka password field). NOTE: some of these details are obtained from third party information.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by ByALBAYX · textwebappsasp
https://www.exploit-db.com/exploits/7801
References (5)
Core 5
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/33578
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/51456
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/33321
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/48062
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/7801
Scores
EPSS
0.0049
EPSS Percentile
65.8%
Details
CWE
CWE-89
Status
published
Products (1)
enthrallweb/ereservations
Published
Jan 22, 2009
Tracked Since
Feb 18, 2026